Restrictions bypass, memroy corruptions, information leakage, URL spoofing.
vulners.com/securityvulns/securityvulns:doc:31141